What is compliance? Some of you might be acutely aware of this term, and others might have little to no idea. In broad terms, business compliance means following the rules required to secure your business and the people that interact with it. More specifically, compliance is aimed at information security. Business Compliance means you are complying with requirements by a credible organization or government department that promotes the security and protection of sensitive information.

Read More

Cybersecurity starts first, and foremost, with people. Even with a secure perimeter, the people using the network can introduce risks to the environment. Teaching your employees what to look out for and where their responsibilities lie are the first steps to closing the security gaps and lessen the chances of your business falling victim to a vicious attack.

Read More

*Special Alert* – Extortion Email Scam

A worrying new type of phishing email is going around using stolen data from high-profile websites. These emails include a password that has been used with the user’s email address in the past in an attempt to scare that person into sending the scammer money (typically Bitcoin). Since the emails include personalized information, they appear credible in ways typical phishing emails do not. Typically, the scammer is claiming that they have recorded “compromising activity” and blackmailing the user for their silence.

Within the last year, Facebook, MyHeritage, Ticketfly, Under Armour, and several other high-profile services have been compromised.

Read More

Ah Budgeting… The least favorite thing we can do in both our personal and business lives.  Although it isn’t fun, it tends to make our lives much easier in the long run.  Let’s break down the basics to getting you and your organization onto a budget plan that will work for your business goals.

Read More

Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.  You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it’s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.

Read More

Nothing lasts forever right?  So many things have a shelf life.  The same can be said for the technology we use daily.  Planning for the End of Life of your existing hardware and software is an important and unavoidable task.  A task that should be analyzed each year as budgets are developed.  As part of your agreement, your UniVista account managers will work with you during this time to help you understand what equipment/software is nearing its EOL and help develop strategies to tackle these upcoming replacements and/or upgrades. So what is EOL exactly?

Read More

Debates.  We all experience them in one way or another.  Which came first, the chicken or the egg?  Was the dress blue or gold?  In the IT world we face similar debates.  One of IT’s largest debate is hardware refresh vs maintaining existing hardware. Most resistance comes from this simple question, how can you best use your already-paid-for hardware while understanding the efficiency issues that come with staying with older equipment? Not to mention storage and daily processing requirements that drive the need to upgrade the hardware. Refresh too early and you’re throwing money out the window. Refresh too late and you risk your company’s IT systems, and ultimately the business itself, screeching to a hard stop.

Read More

Most of us look at that update notification from our devices and think, “I’ll do that later.” When we finally get around to it, there are multiple updates that have been sitting there for weeks. We continue with this behavior because nothing has happened to me yet. In order to change those behaviors, let’s begin to think of updates like you would your car insurance. If you waited to cover yourself, that fender-bender might have cost you a LOT more in the long run.

Read More

Almost every day we hear of a new way hackers are stealing personal information from the public. They are creating so many new ways to exploit us that it’s almost impossible for the security vendors to keep up. This underlines the fact that the best way to try and remain malware free is, and probably always will be, to practice safe computing habits.

Read More